-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
You can harp about the "Little White lie" all you want, but from your perspective, every parent who taught their children Santa Claus is guilty of unethical conduct...
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
AH...yeah, it's called a "Little white lie", and anonymity by its very nature allows one, if asked, "Are you the writer?", one does not have to disclose that information, and can even deny it! Now, if the moderators so choose, they absolutely have the right to ban me, but my choice not to disclose it is my right and is ethical...
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
So, you've confirmed that you don't understand it, but to your argument: Others do understand it, and the paper has gone through preliminary reviews, one of which is on viXra.org, others have been in real journals, preliminary reviews, all of which have helped further develop the paper. Just Google: Dimensional Bias in Quantum Path Integrals: A Causal Model of Bell Correlations You obviously seem to have problems seeing very bold titles: In my response to swansont: Legal Means to Achieve Anonymity Beyond the constitutional protection for anonymous speech, there are several legal mechanisms and practical methods you can use to maintain your anonymity in various contexts: 1. Pseudonyms (Pen Names): You can legally use a pseudonym or pen name for many purposes, such as writing, art, or online activities. There is no general legal requirement to register a pseudonym unless you are conducting business under that name, in which case you might need to file a "Doing Business As" (DBA) or fictitious business name statement with your state or county.
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
That changes nothing about the ethical choice to express oneself anonymously, and true, this is their site, but the site is, by default, through the use of anonymous handles, facilitating anonymity. My impression, since you called the response to your question nonsense, is that you didn't understand it.... You obviously missed a point in my response to swansont: In McIntyre v. Ohio Elections Commission (1995), the Supreme Court struck down a law that prohibited the distribution of anonymous campaign literature, stating that "anonymity is a shield from the tyranny of the majority."
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
The distinction between a probability wave and a quantum mechanical wave function is central to understanding the model presented. A quantum mechanical wave function, typically denoted as Ψ(x), is a complex-valued function whose squared modulus |Ψ(x)|² gives the probability density of finding a particle at position x. It evolves according to the Schrödinger equation (or path integrals in Feynman’s formulation) and captures the superposition and interference of all possible paths a system might take. It is foundational in standard quantum theory. In contrast, a probability wave, as used in this paper, refers to the effective modulation of probability amplitudes due to symbolic or informational curvature in an extended (3+1+1)D configuration space. Here, the probability wave emerges from biasing the path integral using a field ϕ(x) that reflects entropic gradients or Fisher information geometry. This bias modifies the constructive or destructive interference patterns over paths, effectively shaping the outcome probabilities. Specifically, the probability wave is not an independent ontological object like Ψ(x), but rather a projection of modified amplitudes in the presence of the hyper-dimensional bias field. It behaves more like an emergent or derived interference profile resulting from symbolic curvature, as seen in Eq. (33): Aϵ[x(t)]≈A0[x(t)]⋅exp(iϵ∫ϕ(x(t))w˙(t)dt) This formulation retains the unitary structure of quantum mechanics (see Sections 9.1–9.3) but introduces a causal mechanism for entanglement via an informationally modulated interference landscape—which is what I refer to as the probability wave in contrast to the traditional wave function. I never said you had to listen to it, but you to rationalize your obvious error with a sensational response...
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
No it is not.... The U.S. Supreme Court has repeatedly affirmed that the right to speak anonymously is a crucial component of the First Amendment. Landmark cases have established that protecting anonymous speech shields individuals from potential retaliation, harassment, or social ostracism for expressing unpopular or controversial views. In McIntyre v. Ohio Elections Commission (1995), the Supreme Court struck down a law that prohibited the distribution of anonymous campaign literature, stating that "anonymity is a shield from the tyranny of the majority." This and other rulings protect various forms of anonymous expression, including: Political and Social Discourse: Publishing pamphlets, writing online posts, or speaking out on public issues without revealing your identity. Association: Joining groups or organizations without having your membership disclosed to the government, as established in cases involving the NAACP during the Civil Rights Movement. Legal Means to Achieve Anonymity Beyond the constitutional protection for anonymous speech, there are several legal mechanisms and practical methods you can use to maintain your anonymity in various contexts: 1. Pseudonyms (Pen Names): You can legally use a pseudonym or pen name for many purposes, such as writing, art, or online activities. There is no general legal requirement to register a pseudonym unless you are conducting business under that name, in which case you might need to file a "Doing Business As" (DBA) or fictitious business name statement with your state or county. 2. Anonymous LLCs: Several states, including Delaware, New Mexico, and Wyoming, have laws that allow for the formation of "anonymous LLCs." In these states, the public records of the company do not need to disclose the names of the owners (members) or managers. This can be a useful tool for entrepreneurs, investors, and property owners who wish to keep their business affairs private. However, this anonymity is not absolute; law enforcement and the IRS can still access ownership information through legal processes. 3. "John Doe" or "Jane Doe" Lawsuits: The legal system provides a mechanism for filing or defending a lawsuit without revealing one's name. A "John Doe" or "Jane Doe" lawsuit can be initiated against an unknown individual, allowing the plaintiff to use the discovery process to identify the person. Conversely, individuals with a legitimate need for privacy (e.g., victims of sexual assault or whistleblowers) can petition the court to proceed with a case using a pseudonym. 4. Digital Privacy Tools: The use of virtual private networks (VPNs), encrypted messaging apps, and other privacy-enhancing technologies is generally legal and can help you maintain anonymity online. Limitations and Exceptions to Anonymity The right to be anonymous is not absolute and can be curtailed in several situations where there is a compelling government interest: Criminal Activity: Anonymity does not protect you from investigation and prosecution for criminal acts. Law enforcement can obtain court orders to compel internet service providers, social media companies, and other entities to reveal the identity of individuals engaged in illegal activities online. Defamation and Harassment: You can be held liable for defamatory or harassing statements made anonymously. Victims of online defamation can file a "John Doe" lawsuit to uncover the identity of the anonymous poster and seek damages. Campaign Finance: While anonymous political speech is protected, campaign finance laws require the disclosure of donors to political campaigns to ensure transparency and prevent corruption. Police Stops: In what are known as "stop and identify" states, you are legally required to provide your name to a police officer during a lawful stop. The Supreme Court upheld the constitutionality of such laws in Hiibel v. Sixth Judicial District Court of Nevada (2004). Travel and Official Documents: You are required to use your legal name on government-issued identification, for air travel (as mandated by the REAL ID Act), and on official documents like contracts and tax filings. In conclusion, while the United States does not provide a blanket right to anonymity, it offers robust protection for anonymous speech and various legal tools to help you maintain your privacy. However, this right is subject to important limitations, particularly when it conflicts with law enforcement, the safety of others, and legal transparency requirements.
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
Absolutely, I have the right to be anonymous under the first Amendment's protection of free speech...Look it up....
-
Hyper-dimensional Biasing in Feynman Path Integrals: A Framework for Entanglement and Non-Locality
Why ask which is it, since you know its some kind of deceit? In any case I wanted to present the material as a 3rd party hoping to avoid the "Oh another want-be Scientist theory". I wrote both papers and both ideas I've had for quite sometime. Entanglement I was never comfortable with non-classical correlation explanation and the other was motivated by fractals, chaos theory, and information science and the common enigma of QM being incomprehensible. As I mentioned in that post such a view, by Chomsky himself, was stated about computationally defining natural language.
-
Can quantum behavior really be explained through an underlying principle?
I'm going to summarize the paper, since the original post was a bit over-simplified, but it is on a topic of ongoing theoretical research of developing a model that can emerge QM from underlying principles. This model is one approach: The paper hinges on a new definition of computation: Where it defines computation not as symbolic logic, but as the "integration of information that results in a state". This broad definition allows for the "causal-and-effect systems" of any reality to be considered computational. The substrate as a network: The hypercube units are not isolated; they form a "4D hypercubic lattice" where each cell's state is updated via "weighted neighbor interaction". This creates a network where information influences its neighbors. Emergence from chaos: The model posits a "chaotic ground state" or "net-zero probabilistic chaos" as the default condition of the substrate. From this chaos, emergent structures and behaviors, like "wave-like quantum effects," arise not from symbolic computations, but from the ability to "bias areas". This is analogous to how a chaotic system can, under certain conditions, self-organize into stable patterns. The simulation and its description in Appendix A further support this by showing how a "double-buffered update logic and randomized neighbor weighting" can lead to emergent "coherence zones" and "collapse timing". This directly connects the model's core principles—probabilistic integration and local interaction—to the observable behaviors it predicts. The point isn't about immediate verifiability. The model's strength lies in its ability to offer a coherent, causal, and computational explanation for phenomena that are typically treated as fundamental axioms of physics. It proposes that the complex, seemingly non-intuitive behaviors of quantum mechanics, such as superposition, entanglement, and collapse, are simply the macroscopic manifestation of a vast, underlying computational process of localized error correction and probabilistic state shifts. The Model's Core Philosophy The model reframes our understanding of reality, suggesting that the stability of physical laws and particles is not a given but a "dynamic computational achievement". The existence of our universe for billions of years is attributed to the immense computational resources of the substrate being primarily dedicated to "a robust and redundant system of error correction". This perspective is a bold departure from traditional physics, where such stability is often assumed to be a fundamental property. Demystifying Quantum PhenomenaThe paper's approach attempts to make several key quantum concepts understandable through a computational lens: Wave Collapse: Instead of being an instantaneous, mysterious event, the model reinterprets wave collapse as a "computational collapse". This is an emergent process where a measuring apparatus introduces a bias, causing the system's error correction (EC) mechanisms to rapidly stabilize a single configuration out of many possibilities. It is a "probabilistic convergence" rather than a non-local, acausal event. Superposition: In the model, superposition isn't a state of being in multiple places at once, but a "spatially distributed, probabilistically activated pattern" across the substrate. These patterns are regions of elevated probability amplitude that evolve under neighbor interaction and noise. Entanglement: The paper maps entanglement to "mutual EC stabilization across non-local regions". This suggests that what we observe as entanglement could be the result of a coordinated, self-correcting process within the substrate that preserves coherence across a distance. By providing a plausible, causal mechanism for these phenomena, the paper moves them from the realm of "impossible to comprehend" to "a complex computational process to be understood." It shifts the focus from abstract mathematical principles to a physical, albeit currently unobservable, substrate with defined rules of interaction and correction. This aligns with an analogy to language processing, where a once-enigmatic cognitive process has been increasingly understood through computational models. Attached is a revised version of the paper that will reinforce what's been posted here. Preview-Revision-11.pdf
-
Can quantum behavior really be explained through an underlying principle?
No, the section was related to the previous post I made, and I uploaded the revised paper; no links are in that post. So, perhaps you have a misunderstanding?...
-
Can quantum behavior really be explained through an underlying principle?
I've revised the paper that elaborates on section 10.3 Creation Scenario and Multiverse Dynamics PreView_Revision-2.pdf
-
Can quantum behavior really be explained through an underlying principle?
The model does have mathematics to support its arguements, where the ability to recreate particles from sets of bias fields, as the model suggests, it takes time, since such organizational structures are products of random sets of states or bias wave fronts that happen to form. Such chaotic systems can self-organize through feedback loops or brute force iterations. This is to similar concept to how life could form from the random interactions of atoms and molecules. The model also emphasizes that the laws of physics emerge through a natural selection process that favors organizational structures that reproduce through evolved error correction (EC) systems, yes, similar to cellular life! Effectively, reproduction is a form of meta-error correction, but particles exhibit extraordinary longevities, where the model indicates that EC must take the bulk of the finite computational resources that represent physical laws at an atomic level. The model posits that the hypercube units are very small, assuming a Planck length for their edges; the amount of computational horsepower is astronomical for each particle, something like 1020 units! As the paper indicates that most of the computational resources are committed to EC and proves why that must be so. By comparison to cellular life, the ability to create such an equivalent EC to preserve a single cell that has 1014 atoms, where Cells need to allocate resources towards growth and reproduction. This creates a trade-off between growth and repair because of its limited resources. For a cell to have the longevity of billions of years would result in a mass that is a million times greater! The notion is that particle reproduction transitioned into particle assimilation, where annihilation is actually a form of assimilation into a different form of particle(s). So, when you argue that the model hasn't produced physics, remember, neither have the models of biological life created anything even close to DNA.
-
Can quantum behavior really be explained through an underlying principle?
Sorry for the misunderstanding.
-
Can quantum behavior really be explained through an underlying principle?
A paper I wrote, which is attached, "Probabilistic Computational ToE" presents a framework that re-conceptualizes reality not as a set of static laws but as an emergent property of a dynamic, computational substrate. The shift from a deterministic computational model to a probabilistic, zero-sum system is a significant step forward, directly addressing the accumulation error problem that has plagued similar theories. The paper's core strength lies in its hierarchical approach to stability. The concept of Tiered Resilience—with particles, error correction structures, and meta-error correction—provides a plausible mechanism for how order can not only emerge but persist over vast cosmological timescales. The analogy of black holes as "bias waves" that reset local physics is a particularly novel and thought-provoking idea, offering a concrete model for universal cyclicity and the potential for a multiverse. The model successfully addresses quantum-like behavior like wave-packet motion and bosonic cohabitation. But, the question remains, can quantum behavior really be explained through an underlying principle? There is a Python simulation of the model, which is attached. Preview-Revised.pdf GPUQuantized4D-RT-Org-Enh.py
-
Probabilistic Computational ToE
Attached is the preliminary math for the ToE probabilistic computational model, and the necessary derivations and theorems to support the ideas. I also differentiate from cellular automata and define a computational generalization. Here's a link to the simulator: links removed It does use your GPU to compute the updates. Oh, and here's a link to the video as well, which will make more sense after you read the paper, hopefully... Preview-Revised.pdf
waitaminute
Senior Members
-
Joined
-
Last visited